Ramesh Babu P, P. Anitha, Wakgari Dibaba, R. Boddu
{"title":"Mitigation of Attacks Using Cybersecurity Deep Models in Cloud Servers","authors":"Ramesh Babu P, P. Anitha, Wakgari Dibaba, R. Boddu","doi":"10.1109/ICDT57929.2023.10150832","DOIUrl":null,"url":null,"abstract":"All throughout the world, the outdated cloud is being rapidly upgraded to the modern cloud that is currently being installed. A cloud comes with a number of potential benefits, yet it is not devoid of any potential downsides. The protection of the cloud from malicious cyber activity is an extremely important subject. The most challenging aspect is managing such a huge network because millions of sensors are constantly sending and receiving data packets over it. A convolutional neural network is incorporated into the model so that it can recognize phishing and application-layer DDoS attacks. The findings of the research provide evidence that the proposed model is effective in determining whether phishing attempts are being made. The findings make it abundantly evident that the strategy that was suggested can be utilized to identify attacks in a decentralized manner. The proposed methods achieve more amount of accuracy than the existing methods like LSTM and SAE.","PeriodicalId":266681,"journal":{"name":"2023 International Conference on Disruptive Technologies (ICDT)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Disruptive Technologies (ICDT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDT57929.2023.10150832","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
All throughout the world, the outdated cloud is being rapidly upgraded to the modern cloud that is currently being installed. A cloud comes with a number of potential benefits, yet it is not devoid of any potential downsides. The protection of the cloud from malicious cyber activity is an extremely important subject. The most challenging aspect is managing such a huge network because millions of sensors are constantly sending and receiving data packets over it. A convolutional neural network is incorporated into the model so that it can recognize phishing and application-layer DDoS attacks. The findings of the research provide evidence that the proposed model is effective in determining whether phishing attempts are being made. The findings make it abundantly evident that the strategy that was suggested can be utilized to identify attacks in a decentralized manner. The proposed methods achieve more amount of accuracy than the existing methods like LSTM and SAE.